Categories: SecurityWorkspace

Cash Machines Hacked By Cybercriminals For Free Money

Customers will no longer need to look over their shoulder for the most worrying threat when using a cash point following the news that cybercriminals have developed a way to hack into and empty ATM’s.

The Tyupkin malware was detected by online security firm Kaspersky as having infected cash machines at over 50 banks across Eastern Europe, netting millions for the criminals involved, and now looks to have also spread to the U.S., China and India.

Tyupkin infects cash machines running older 32-bit versions of the Windows operating system, and allows the criminals direct control of the machine, meaning they can tell it to dispense all of its cash. However, the exploit does need physical access to the machines so that the criminals can insert a bootable CD in order to install the malware, which becomes active when the machine is rebooted, locking down the machine for the criminal.

Hack attack

Users are prompted for a specific PIN key, which when correctly entered shows information on how much money is present in each machine cassette, with a maximum of 40 notes available to withdraw each time.

In order to avoid detection, the malware has also been designed to only be active at certain times during the night, meaning it avoids other busier periods.

“Over the last few years, we have observed a major upswing in ATM attacks using skimming devices and malicious software,” Vicente Diaz, principal security researcher at Kaspersky Lab, said. “Now we are seeing the natural evolution of this threat with cyber-criminals moving up the chain and targeting financial institutions directly.

“Our recommendations for the banks is to review the physical security of their ATMs and consider investing in quality security solutions.”

The discovery of this malware, although small in scale at this point, does mean that many European banks will need to evaluate the need to tighten the security around their cash points, according to Jean Taggart, senior security researcher at Malwarebytes.

“The larger issue is that the banks still do risk analysis and fraud budgets to evaluate if the problem needs immediate attention, rather than addressing the problem from the get go,” he added.

A similar malware variant, which allowed criminals to control infected ATMs via remote text message, was detected earlier this year by security firm Symantec. Cash machines have become an increasingly popular target for attack from cybercriminals in recent years, particularly following the news that almost 95 percent of ATMs continue to run on Windows XP.

Are you a security pro? Try our quiz!

Mike Moore

Michael Moore joined TechWeek Europe in January 2014 as a trainee before graduating to Reporter later that year. He covers a wide range of topics, including but not limited to mobile devices, wearable tech, the Internet of Things, and financial technology.

Recent Posts

Russia Accused Of Cyberattack On Germany’s Ruling Party, Defence Firms

German foreign minister warns Russia will face consequences for “absolutely intolerable” cyberattack on ruling party,…

14 hours ago

Alphabet Axes Hundreds Of Staff From ‘Core’ Organisation

Google is reportedly laying off at least 200 staff from its “Core” organisation, including key…

15 hours ago

Apple Announces Record Share Buyback, Amid iPhone Sales Decline

Investor appeasement? Apple unveils huge $110 billion share buyback program, as sales of iPhone decline…

18 hours ago

Tesla Backs Away From Gigacasting Manufacturing – Report

Tesla retreats from pioneering gigacasting manufacturing process, amid cost cutting and challenges at EV giant

1 day ago

US Urges No AI Control Of Nuclear Weapons

No skynet please. After the US, UK and France pledge human only control of nuclear…

1 day ago